Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 06:37
Static task
static1
Behavioral task
behavioral1
Sample
2c9390be706b71f233a86478339c1093_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2c9390be706b71f233a86478339c1093_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
2c9390be706b71f233a86478339c1093_JaffaCakes118.dll
-
Size
10KB
-
MD5
2c9390be706b71f233a86478339c1093
-
SHA1
3b98ca9af1ba753f055732a369724050ab32e240
-
SHA256
19afc04537dbfb2b96618e756fc69c1aece8cb02dea843d76fae7e888ad12724
-
SHA512
9ffe97e81bd6734e9e6e49bf3fa459f910929de4f32f37472d6365f19f58433d848c8a2659fd5d9d6fa45da0589d3039339ad33a9a9923fdb6f81510377c44a1
-
SSDEEP
192:t24CA8vlUAluK2Ywl/+pfK35KmG3oDvu:shA8vlUAluKUlmM5KmG3oDu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1904 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1904 2008 rundll32.exe 30 PID 2008 wrote to memory of 1904 2008 rundll32.exe 30 PID 2008 wrote to memory of 1904 2008 rundll32.exe 30 PID 2008 wrote to memory of 1904 2008 rundll32.exe 30 PID 2008 wrote to memory of 1904 2008 rundll32.exe 30 PID 2008 wrote to memory of 1904 2008 rundll32.exe 30 PID 2008 wrote to memory of 1904 2008 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2c9390be706b71f233a86478339c1093_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2c9390be706b71f233a86478339c1093_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1904
-